SlideShare a Scribd company logo
Guiding Identification
of Missing Scenarios
for Dynamic Feature Location
Shinpei Hayashi,†1
Hiroshi Kazato,†2
Takashi Kobayashi,†1
Tsuyoshi Oshima,†3
Katsuyuki Natsukawa,†3
Takashi Hoshino,†3 and
Motoshi Saeki†1
†1 Tokyo Institute of Technology
†2 NTT DATA CORPORATION
†3 NTT Software Innovation Center
Dynamic Feature Location
l Specifying modules based on the execution profiles
obtained using scenarios
– Lack of scenarios leads to insufficient results
Feature implementation
Scenario
1
Scenario
2
Missing
non-invoked
modules
Found
Finding Clues for New Scenarios
l Which unexplored call dependencies ( )
should we focus on for preparing new scenarios?
Problem:
?
?
?
?
?
?
??
?
?
Prioritization Deps. by Metrics
l Measuring the potential impact of unexplored
dependencies
– NODU(dep): number of outgoing unexplored deps. = 5
dep
Incoming
modules/dependencies
(reaching/using d)
Outgoing
modules/dependencies
(reached/used by d)
Solution:
1
2
3
4
5

More Related Content

PDF
iFL: An Interactive Environment for Understanding Feature Implementations
PDF
Visualizing Stakeholder Concerns with Anchored Map
PDF
Toward Understanding How Developers Recognize Features in Source Code from De...
PDF
Supporting Design Model Refactoring for Improving Class Responsibility Assign...
PDF
Toward Structured Location of Features
PDF
Recording Finer-Grained Software Evolution with IDE: An Annotation-Based Appr...
PDF
Generating Assertion Code from OCL: A Transformational Approach Based on Simi...
PDF
Detecting Occurrences of Refactoring with Heuristic Search
iFL: An Interactive Environment for Understanding Feature Implementations
Visualizing Stakeholder Concerns with Anchored Map
Toward Understanding How Developers Recognize Features in Source Code from De...
Supporting Design Model Refactoring for Improving Class Responsibility Assign...
Toward Structured Location of Features
Recording Finer-Grained Software Evolution with IDE: An Annotation-Based Appr...
Generating Assertion Code from OCL: A Transformational Approach Based on Simi...
Detecting Occurrences of Refactoring with Heuristic Search

What's hot (18)

PDF
Everybody be cool, this is a roppery!
PDF
HDR Defence - Software Abstractions for Parallel Architectures
PDF
Historef: A Tool for Edit History Refactoring
PDF
Refactoring Edit History of Source Code
PPTX
Concept lattices: a representation space to structure software variability
PDF
(Costless) Software Abstractions for Parallel Architectures
PDF
PPTX
C programming interview questions
PPS
02 iec t1_s1_plt_session_02
PDF
Faults and Regression testing - Localizing Failure-Inducing Program Edits Bas...
PDF
Tyuukan
PPS
07 iec t1_s1_oo_ps_session_10
PPS
Aae oop xp_07
PPTX
Reverse Engineering Feature Models From Software Variants to Build Software P...
PDF
A gentle introduction to reflection
PDF
De-virtualizing virtual Function Calls using various Type Analysis Technique...
PPS
12 iec t1_s1_oo_ps_session_17
Everybody be cool, this is a roppery!
HDR Defence - Software Abstractions for Parallel Architectures
Historef: A Tool for Edit History Refactoring
Refactoring Edit History of Source Code
Concept lattices: a representation space to structure software variability
(Costless) Software Abstractions for Parallel Architectures
C programming interview questions
02 iec t1_s1_plt_session_02
Faults and Regression testing - Localizing Failure-Inducing Program Edits Bas...
Tyuukan
07 iec t1_s1_oo_ps_session_10
Aae oop xp_07
Reverse Engineering Feature Models From Software Variants to Build Software P...
A gentle introduction to reflection
De-virtualizing virtual Function Calls using various Type Analysis Technique...
12 iec t1_s1_oo_ps_session_17
Ad

Viewers also liked (10)

PDF
Understanding Source Code Differences by Separating Refactoring Effects
PDF
Incremental Feature Location and Identification in Source Code
PDF
Terminology Matching of Requirements Specification Documents and Regulations ...
PDF
How Can You Improve Your As-is Models? Requirements Analysis Methods Meet GQM
PDF
Feature Location for Multi-Layer System Based on Formal Concept Analysis
PDF
Modeling and Utilizing Security Knowledge for Eliciting Security Requirements
PDF
Establishing Regulatory Compliance in Goal-Oriented Requirements Analysis
PDF
Class Responsibility Assignment as Fuzzy Constraint Satisfaction
PDF
Sentence-to-Code Traceability Recovery with Domain Ontologies
PDF
FOSE2010 ミニチュートリアル 「データマイニング技術を応用したソフトウェア構築・保守支援」
Understanding Source Code Differences by Separating Refactoring Effects
Incremental Feature Location and Identification in Source Code
Terminology Matching of Requirements Specification Documents and Regulations ...
How Can You Improve Your As-is Models? Requirements Analysis Methods Meet GQM
Feature Location for Multi-Layer System Based on Formal Concept Analysis
Modeling and Utilizing Security Knowledge for Eliciting Security Requirements
Establishing Regulatory Compliance in Goal-Oriented Requirements Analysis
Class Responsibility Assignment as Fuzzy Constraint Satisfaction
Sentence-to-Code Traceability Recovery with Domain Ontologies
FOSE2010 ミニチュートリアル 「データマイニング技術を応用したソフトウェア構築・保守支援」
Ad

Similar to Guiding Identification of Missing Scenarios for Dynamic Feature Location (11)

PDF
Because you can’t fix what you don’t know is broken...
PPT
20051019 automating regression testing for evolving gui software
PPTX
CSE202.pptx
PDF
Automated deployment of data collection policies over heterogeneous shared se...
PPT
EEDC Programming Models
PPTX
91 Conf Presentation
PPTX
Benchmarking with JMH (riviera dev 2017)
PPTX
Static analysis works for mission-critical systems, why not yours?
PDF
Domain driven design ch1
PPTX
1_Introduction_to_R - disease modeling.pptx
PDF
AI for Program Specifications UW PLSE 2025 - final.pdf
Because you can’t fix what you don’t know is broken...
20051019 automating regression testing for evolving gui software
CSE202.pptx
Automated deployment of data collection policies over heterogeneous shared se...
EEDC Programming Models
91 Conf Presentation
Benchmarking with JMH (riviera dev 2017)
Static analysis works for mission-critical systems, why not yours?
Domain driven design ch1
1_Introduction_to_R - disease modeling.pptx
AI for Program Specifications UW PLSE 2025 - final.pdf

More from Institute of Science Tokyo (9)

PDF
Revisiting the Effect of Branch Handling Strategies on Change Recommendation
PDF
An Extensive Study on Smell Aware Bug Localization
PDF
RefactorHub: A Commit Annotator for Refactoring
PDF
Can Automated Impact Analysis Technique Help Predicting Decaying Modules?
PDF
The Impact of Systematic Edits in History Slicing
PDF
ChangeMacroRecorder: Recording Fine-Grained Textual Changes of Source Code
PDF
Inference-Based Detection of Architectural Violations in MVC2
PDF
Detecting Bad Smells of Refinement in Goal-Oriented Requirements Analysis
PDF
ソフトウェア工学勉強会への誘い
Revisiting the Effect of Branch Handling Strategies on Change Recommendation
An Extensive Study on Smell Aware Bug Localization
RefactorHub: A Commit Annotator for Refactoring
Can Automated Impact Analysis Technique Help Predicting Decaying Modules?
The Impact of Systematic Edits in History Slicing
ChangeMacroRecorder: Recording Fine-Grained Textual Changes of Source Code
Inference-Based Detection of Architectural Violations in MVC2
Detecting Bad Smells of Refinement in Goal-Oriented Requirements Analysis
ソフトウェア工学勉強会への誘い

Recently uploaded (20)

PDF
Design an Analysis of Algorithms I-SECS-1021-03
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PPTX
Essential Infomation Tech presentation.pptx
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PPTX
L1 - Introduction to python Backend.pptx
PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
System and Network Administraation Chapter 3
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
AI in Product Development-omnex systems
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PPTX
Reimagine Home Health with the Power of Agentic AI​
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PPTX
ai tools demonstartion for schools and inter college
Design an Analysis of Algorithms I-SECS-1021-03
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
Essential Infomation Tech presentation.pptx
How to Migrate SBCGlobal Email to Yahoo Easily
Design an Analysis of Algorithms II-SECS-1021-03
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
L1 - Introduction to python Backend.pptx
Odoo POS Development Services by CandidRoot Solutions
Wondershare Filmora 15 Crack With Activation Key [2025
System and Network Administraation Chapter 3
Internet Downloader Manager (IDM) Crack 6.42 Build 41
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
Operating system designcfffgfgggggggvggggggggg
AI in Product Development-omnex systems
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
Reimagine Home Health with the Power of Agentic AI​
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
ai tools demonstartion for schools and inter college

Guiding Identification of Missing Scenarios for Dynamic Feature Location

  • 1. Guiding Identification of Missing Scenarios for Dynamic Feature Location Shinpei Hayashi,†1 Hiroshi Kazato,†2 Takashi Kobayashi,†1 Tsuyoshi Oshima,†3 Katsuyuki Natsukawa,†3 Takashi Hoshino,†3 and Motoshi Saeki†1 †1 Tokyo Institute of Technology †2 NTT DATA CORPORATION †3 NTT Software Innovation Center
  • 2. Dynamic Feature Location l Specifying modules based on the execution profiles obtained using scenarios – Lack of scenarios leads to insufficient results Feature implementation Scenario 1 Scenario 2 Missing non-invoked modules Found
  • 3. Finding Clues for New Scenarios l Which unexplored call dependencies ( ) should we focus on for preparing new scenarios? Problem: ? ? ? ? ? ? ?? ? ?
  • 4. Prioritization Deps. by Metrics l Measuring the potential impact of unexplored dependencies – NODU(dep): number of outgoing unexplored deps. = 5 dep Incoming modules/dependencies (reaching/using d) Outgoing modules/dependencies (reached/used by d) Solution: 1 2 3 4 5